Computer hardware
components
G11 – Level one
Hajer Elsayed
Mansoura University
Department of Information
Technology
Dr. Aya Mohamed Elzoghby.
Table of contents
01. Introduction 05. Operating Systems
and Software
Applications
02. Central Processing Unit 06. Networking and the
(CPU) Internet
03. Random Access 07. Cybersecurity Basics
Memory (RAM)
04. Basic Components of a 08. Emerging Trends in
Computer System Information Technology
08. Conclusion
Introduction
Overview:
Information Technology (IT) has transformed
the way we live, work, and interact in today's
digital age. It encompasses a broad range of
technologies and processes that are essential
for businesses, governments, educational
institutions, healthcare, and daily life.
Importance:
IT plays a crucial role in enabling efficient
data management, seamless communication,
automation of processes, and continuous
innovation across various sectors.
Definition and Scope of Information
Technology
Importance:
Definition:
IT uses computers, Essential for
software, networks, and Scope: productivity, innovation,
devices to manage connectivity, and
IT covers data
data, communication, economic growth across
management,
automation, and industries.
communication,
security. automation, security,
software development,
networking, cloud
computing, AI/ML, IoT,
and digital
transformation.
Historical Evolution of Information
Early Computing
Technology (IT)Internet and World
Wide Web
Devices: (1990s):
19th century: Mechanical Global internet for
calculators information
Mid-20th century: First exchange.
electronic computers web browsers, e-
commerce
Mainframe and Mobile and Wireless
Minicomputers Technologies (2000s-
Present):
Large, centralized
computers for Cloud computing, IoT,
business and science digital
transformation.
Current Trends:
Personal Computers
(1980s): Advancements in
AI/ML, big data,
Affordable PCs (IBM, cybersecurity,
Apple, Microsoft). blockchain.
Basic Components of a Computer System
Central Processing Unit
(CPU): Motherboard:
Acts as the brain of the 1 6 Main circuit board
computer, executing connecting all components
instructions and processing
data. Power Supply Unit
(PSU):
Memory (RAM):
Temporary storage for data
2 7 Converts electricity from
the outlet into usable
and instructions that the
Components power for the computer
CPU is currently
components.
processing.
Expansion Cards:
Storage Devices: 3 8 Add-on cards like graphics
Hard Disk Drives (HDDs)
cards, sound cards, and
and Solid State Drives
network cards
(SSDs) store data long-
term. Operating System (OS):
4 9 Software that manages
Input Devices: hardware resources, runs
Keyboard, mouse, applications, and provides
touchpad, and microphone user interfaces.
Output Devices: Software Applications:
Monitor, printer, speakers, 5 10 word processing, web
and headphones browsing, and gaming.
Operating Systems and Software
Applications
Operating Systems
(OS):
• Manage hardware and
Software
provide services.
• Examples: Windows, Applications:
macOS, Linux, Android,
• Programs for specific
iOS.
tasks.
Integration and
• Functions: Memory, file Compatibility:
• Categories: Word
systems, user interfaces.
Processing, Spreadsheets,
• OS and app compatibility
Web Browsers, Graphic
is crucial.
Design, Gaming, etc.
• Issues with different
• Distribution: Installed
versions or hardware.
(traditional apps), Web-
based (SaaS), Mobile
Apps.
Introduction to Networking and the Internet
1 Networking Basics Internet Services
4
• Connects
computers for
Email, Web
resource
Browsing, File
sharing.
Transfer,
• LAN, WAN,
Streaming.
Wireless
Networks.
2
Introduction 3
• Global Internet Overview
Cloud Computing
Online storage,
network of
computing,
networks.
software.
• Access to vast
Scalable and
information
cost-efficient.
and services.
Cybersecurity
Basics 1. Definition: Protecting
computers, networks, and data
from unauthorized access and
attacks.
2. Threats:
1. Malware: Viruses, worms,
ransomware.
2. Phishing: Fraudulent emails.
3. Hacking: Unauthorized
access.
4. Social Engineering:
Manipulation for info theft.
3. Measures:
1. Antivirus, Firewalls,
Encryption.
2. Strong Passwords, MFA.
3. User Awareness, Training.
4. Response:
1. Incident Plans, Detection
Systems.
2. Compliance with Regulations.
Emerging Trends in Information
Technology Artificial Intelligence (AI) and
Cloud Computing: Machine Learning (ML):
Shift towards cloud-based AI algorithms enable machines to
services for storage, computing, learn from data, make decisions, and
and software delivery. perform tasks.
Benefits include scalability, Applications include automation,
predictive analytics, natural
flexibility, cost-efficiency, and
language processing, and image
Internet of Things
accessibility. Blockchain
recognition.
(IoT): Technology:
Interconnected devices and Decentralized and secure digital
sensors collect and exchange ledgers for recording transactions
data over the internet. and data.
Enables smart homes, wearable Used in cryptocurrencies, supply
technology, industrial automation, chain management, smart
and smart cities. contracts, and identity
verification.
Conclusion
● Summary of Key Points:
● Information Technology (IT) is a fundamental part of
modern life, enabling efficient data management,
communication, automation, and innovation.
● The historical evolution of IT has seen significant
advancements from early computing devices to cloud
computing, AI/ML, and 5G technology.
● Basic components of a computer system include the
CPU, memory, storage devices, input/output devices,
motherboard, and software components like
operating systems and applications.
● Networking and the Internet play a crucial role in
connecting devices, sharing resources, accessing
information, and enabling online services.
● Cybersecurity is essential to protect computer
systems, networks, and data from cyber threats like
malware, phishing, hacking, and social engineering.
RESOURCES
New
Mansoura
University
Books Online Websites
• "Information Technology for Beginners" by John • Coursera: Introduction to Networking
Smith • edX: Cybersecurity Fundamentals
• "Cybersecurity Essentials" by Sarah Johnson • Udemy: Cloud Computing Basics
• "Cloud Computing Explained" by Mark Anderson
• Reddit - r/ITCareerQuestions
• Stack Exchange - [Link]
• LinkedIn Groups: IT Professionals Network
Scientific Journals
• Krebs on Security ([Link]
• Dark Reading ([Link]
• The Verge ([Link]
Links
• TechCrunch ([Link] Professional Organizations
• Wired ([Link]
• IT Pro Today ([Link] • Association for Computing Machinery (ACM) -
[Link]
• International Association of Privacy Professionals
(IAPP) - [Link]